MULTI-TENANCY PROTECTION FOR ACCELERATORS
An accelerator includes a memory, a compute zone to receive an encrypted workload downloaded from a tenant application running in a virtual machine on a host computing system attached to the accelerator, and a processor subsystem to execute a cryptographic key exchange protocol with the tenant appli...
Gespeichert in:
Hauptverfasser: | , , , , , , , , , , , , , , , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | Gupta, Niraj Ni Scanaill, Cliodhna Piel, Tuyet-Trang Shah, Mitul Bucsa, Mihai Bogdan Mungara, Subba B, Sivakumar Zhu, Lingyun Zubarev, Roman Taylor, Stewart Kadam, Akshay Qian, Yi Lim, Raynald Budnikov, Dmitry Becker, Ricardo Booth, JR., Lawrence Tu, Steven |
description | An accelerator includes a memory, a compute zone to receive an encrypted workload downloaded from a tenant application running in a virtual machine on a host computing system attached to the accelerator, and a processor subsystem to execute a cryptographic key exchange protocol with the tenant application to derive a session key for the compute zone and to program the session key into the compute zone. The compute zone is to decrypt the encrypted workload using the session key, receive an encrypted data stream from the tenant application, decrypt the encrypted data stream using the session key, and process the decrypted data stream by executing the workload to produce metadata. |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US2022311594A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US2022311594A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US2022311594A13</originalsourceid><addsrcrecordid>eNrjZND0DfUJ8dQNcfVz9HOOVAgI8g9xdQ7x9PdTcPMPUnB0dnb1cQ1yDPEPCuZhYE1LzClO5YXS3AzKbq4hzh66qQX58anFBYnJqXmpJfGhwUYGRkbGhoamliaOhsbEqQIA3Voljg</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>MULTI-TENANCY PROTECTION FOR ACCELERATORS</title><source>esp@cenet</source><creator>Gupta, Niraj ; Ni Scanaill, Cliodhna ; Piel, Tuyet-Trang ; Shah, Mitul ; Bucsa, Mihai Bogdan ; Mungara, Subba ; B, Sivakumar ; Zhu, Lingyun ; Zubarev, Roman ; Taylor, Stewart ; Kadam, Akshay ; Qian, Yi ; Lim, Raynald ; Budnikov, Dmitry ; Becker, Ricardo ; Booth, JR., Lawrence ; Tu, Steven</creator><creatorcontrib>Gupta, Niraj ; Ni Scanaill, Cliodhna ; Piel, Tuyet-Trang ; Shah, Mitul ; Bucsa, Mihai Bogdan ; Mungara, Subba ; B, Sivakumar ; Zhu, Lingyun ; Zubarev, Roman ; Taylor, Stewart ; Kadam, Akshay ; Qian, Yi ; Lim, Raynald ; Budnikov, Dmitry ; Becker, Ricardo ; Booth, JR., Lawrence ; Tu, Steven</creatorcontrib><description>An accelerator includes a memory, a compute zone to receive an encrypted workload downloaded from a tenant application running in a virtual machine on a host computing system attached to the accelerator, and a processor subsystem to execute a cryptographic key exchange protocol with the tenant application to derive a session key for the compute zone and to program the session key into the compute zone. The compute zone is to decrypt the encrypted workload using the session key, receive an encrypted data stream from the tenant application, decrypt the encrypted data stream using the session key, and process the decrypted data stream by executing the workload to produce metadata.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRIC DIGITAL DATA PROCESSING ; ELECTRICITY ; PHYSICS ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2022</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20220929&DB=EPODOC&CC=US&NR=2022311594A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20220929&DB=EPODOC&CC=US&NR=2022311594A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Gupta, Niraj</creatorcontrib><creatorcontrib>Ni Scanaill, Cliodhna</creatorcontrib><creatorcontrib>Piel, Tuyet-Trang</creatorcontrib><creatorcontrib>Shah, Mitul</creatorcontrib><creatorcontrib>Bucsa, Mihai Bogdan</creatorcontrib><creatorcontrib>Mungara, Subba</creatorcontrib><creatorcontrib>B, Sivakumar</creatorcontrib><creatorcontrib>Zhu, Lingyun</creatorcontrib><creatorcontrib>Zubarev, Roman</creatorcontrib><creatorcontrib>Taylor, Stewart</creatorcontrib><creatorcontrib>Kadam, Akshay</creatorcontrib><creatorcontrib>Qian, Yi</creatorcontrib><creatorcontrib>Lim, Raynald</creatorcontrib><creatorcontrib>Budnikov, Dmitry</creatorcontrib><creatorcontrib>Becker, Ricardo</creatorcontrib><creatorcontrib>Booth, JR., Lawrence</creatorcontrib><creatorcontrib>Tu, Steven</creatorcontrib><title>MULTI-TENANCY PROTECTION FOR ACCELERATORS</title><description>An accelerator includes a memory, a compute zone to receive an encrypted workload downloaded from a tenant application running in a virtual machine on a host computing system attached to the accelerator, and a processor subsystem to execute a cryptographic key exchange protocol with the tenant application to derive a session key for the compute zone and to program the session key into the compute zone. The compute zone is to decrypt the encrypted workload using the session key, receive an encrypted data stream from the tenant application, decrypt the encrypted data stream using the session key, and process the decrypted data stream by executing the workload to produce metadata.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>ELECTRICITY</subject><subject>PHYSICS</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2022</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZND0DfUJ8dQNcfVz9HOOVAgI8g9xdQ7x9PdTcPMPUnB0dnb1cQ1yDPEPCuZhYE1LzClO5YXS3AzKbq4hzh66qQX58anFBYnJqXmpJfGhwUYGRkbGhoamliaOhsbEqQIA3Voljg</recordid><startdate>20220929</startdate><enddate>20220929</enddate><creator>Gupta, Niraj</creator><creator>Ni Scanaill, Cliodhna</creator><creator>Piel, Tuyet-Trang</creator><creator>Shah, Mitul</creator><creator>Bucsa, Mihai Bogdan</creator><creator>Mungara, Subba</creator><creator>B, Sivakumar</creator><creator>Zhu, Lingyun</creator><creator>Zubarev, Roman</creator><creator>Taylor, Stewart</creator><creator>Kadam, Akshay</creator><creator>Qian, Yi</creator><creator>Lim, Raynald</creator><creator>Budnikov, Dmitry</creator><creator>Becker, Ricardo</creator><creator>Booth, JR., Lawrence</creator><creator>Tu, Steven</creator><scope>EVB</scope></search><sort><creationdate>20220929</creationdate><title>MULTI-TENANCY PROTECTION FOR ACCELERATORS</title><author>Gupta, Niraj ; Ni Scanaill, Cliodhna ; Piel, Tuyet-Trang ; Shah, Mitul ; Bucsa, Mihai Bogdan ; Mungara, Subba ; B, Sivakumar ; Zhu, Lingyun ; Zubarev, Roman ; Taylor, Stewart ; Kadam, Akshay ; Qian, Yi ; Lim, Raynald ; Budnikov, Dmitry ; Becker, Ricardo ; Booth, JR., Lawrence ; Tu, Steven</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US2022311594A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2022</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>ELECTRICITY</topic><topic>PHYSICS</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>Gupta, Niraj</creatorcontrib><creatorcontrib>Ni Scanaill, Cliodhna</creatorcontrib><creatorcontrib>Piel, Tuyet-Trang</creatorcontrib><creatorcontrib>Shah, Mitul</creatorcontrib><creatorcontrib>Bucsa, Mihai Bogdan</creatorcontrib><creatorcontrib>Mungara, Subba</creatorcontrib><creatorcontrib>B, Sivakumar</creatorcontrib><creatorcontrib>Zhu, Lingyun</creatorcontrib><creatorcontrib>Zubarev, Roman</creatorcontrib><creatorcontrib>Taylor, Stewart</creatorcontrib><creatorcontrib>Kadam, Akshay</creatorcontrib><creatorcontrib>Qian, Yi</creatorcontrib><creatorcontrib>Lim, Raynald</creatorcontrib><creatorcontrib>Budnikov, Dmitry</creatorcontrib><creatorcontrib>Becker, Ricardo</creatorcontrib><creatorcontrib>Booth, JR., Lawrence</creatorcontrib><creatorcontrib>Tu, Steven</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Gupta, Niraj</au><au>Ni Scanaill, Cliodhna</au><au>Piel, Tuyet-Trang</au><au>Shah, Mitul</au><au>Bucsa, Mihai Bogdan</au><au>Mungara, Subba</au><au>B, Sivakumar</au><au>Zhu, Lingyun</au><au>Zubarev, Roman</au><au>Taylor, Stewart</au><au>Kadam, Akshay</au><au>Qian, Yi</au><au>Lim, Raynald</au><au>Budnikov, Dmitry</au><au>Becker, Ricardo</au><au>Booth, JR., Lawrence</au><au>Tu, Steven</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>MULTI-TENANCY PROTECTION FOR ACCELERATORS</title><date>2022-09-29</date><risdate>2022</risdate><abstract>An accelerator includes a memory, a compute zone to receive an encrypted workload downloaded from a tenant application running in a virtual machine on a host computing system attached to the accelerator, and a processor subsystem to execute a cryptographic key exchange protocol with the tenant application to derive a session key for the compute zone and to program the session key into the compute zone. The compute zone is to decrypt the encrypted workload using the session key, receive an encrypted data stream from the tenant application, decrypt the encrypted data stream using the session key, and process the decrypted data stream by executing the workload to produce metadata.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_epo_espacenet_US2022311594A1 |
source | esp@cenet |
subjects | CALCULATING COMPUTING COUNTING ELECTRIC COMMUNICATION TECHNIQUE ELECTRIC DIGITAL DATA PROCESSING ELECTRICITY PHYSICS TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION |
title | MULTI-TENANCY PROTECTION FOR ACCELERATORS |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-25T11%3A26%3A11IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Gupta,%20Niraj&rft.date=2022-09-29&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS2022311594A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |